We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-8152

WP CTA – Call To Action Plugin, Sticky CTA, Sticky Buttons <= 1.7.0 - Missing Authorization to Unauthenticated Sticky Status Update



Description

The WP CTA – Call To Action Plugin, Sticky CTA, Sticky Buttons plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'update_cta_status' and 'change_sticky_sidebar_name' functions in all versions up to, and including, 1.7.0. This makes it possible for unauthenticated attackers to update the status of a sticky and update the name displayed in the back-end WP CTA Dashboard.

Reserved 2025-07-25 | Published 2025-08-02 | Updated 2025-08-02 | Assigner Wordfence


MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-862 Missing Authorization

Product status

Default status
unaffected

*
affected

Timeline

2025-08-01:Disclosed

Credits

Sushi Com Abacate finder

References

www.wordfence.com/...-8f03-4320-99f0-3f53f7b2fc44?source=cve

plugins.trac.wordpress.org/...bar/trunk/inc/ClassActions.php

plugins.trac.wordpress.org/...bar/trunk/inc/ClassActions.php

plugins.trac.wordpress.org/...-sidebar&sfp_email=&sfph_mail=

cve.org (CVE-2025-8152)

nvd.nist.gov (CVE-2025-8152)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-8152

Support options

Helpdesk Chat, Email, Knowledgebase